Multiple vulnerabilities in Google Chrome



Published: 2022-06-21 | Updated: 2022-06-23
Risk High
Patch available YES
Number of vulnerabilities 9
CVE-ID CVE-2022-2156
CVE-2022-2157
CVE-2022-2158
CVE-2022-2160
CVE-2022-2161
CVE-2022-2162
CVE-2022-2163
CVE-2022-2164
CVE-2022-2165
CWE-ID CWE-416
CWE-843
CWE-264
CWE-358
CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Google Chromium
Client/Desktop applications / Web browsers

Vendor Google

Security Bulletin

This security bulletin contains information about 9 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU64560

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-2156

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the Base component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to version 103.0.5060.53.

Vulnerable software versions

Google Chromium: 103.0.5006.0 - 103.0.5030.1


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1335458
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2156

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

2) Use-after-free

EUVDB-ID: #VU64561

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-2157

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the Interest groups component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to version 103.0.5060.53.

Vulnerable software versions

Google Chromium: 103.0.5006.0 - 103.0.5030.1


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1327312
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2157

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

3) Type Confusion

EUVDB-ID: #VU64562

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-2158

CWE-ID: CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a type confusion error within the V8 component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger a type confusion error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update to version 103.0.5060.53.

Vulnerable software versions

Google Chromium: 103.0.5006.0 - 103.0.5030.1


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1321078
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2158

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

4) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU64563

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-2160

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient policy enforcement in DevTools in Google Chrome. A remote attacker can trick the victim to visit a specially crafted website, bypass implemented security measures and gain access to sensitive information.

Mitigation

Update to version 103.0.5060.53.

Vulnerable software versions

Google Chromium: 103.0.5006.0 - 103.0.5030.1


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1116450
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2160

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

5) Use-after-free

EUVDB-ID: #VU64564

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-2161

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within WebApp Provider in Google Chrome. A remote attacker can trick the victim into visiting a specially crafted web page, trigger a use-after-free error and gain access to sensitive information.

Mitigation

Update to version 103.0.5060.53.

Vulnerable software versions

Google Chromium: 103.0.5006.0 - 103.0.5030.1


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1330289
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2161

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

6) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU64565

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-2162

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient policy enforcement in File System API in Google Chrome. A remote attacker can trick the victim to visit a specially crafted website, bypass implemented security measures and gain access to sensitive information.

Mitigation

Update to version 103.0.5060.53.

Vulnerable software versions

Google Chromium: 103.0.5006.0 - 103.0.5030.1


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1307930
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2162

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

7) Use-after-free

EUVDB-ID: #VU64566

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-2163

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to use-after-free error in Cast UI and Toolbar in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and crash the browser.

Mitigation

Update to version 103.0.5060.53.

Vulnerable software versions

Google Chromium: 103.0.5006.0 - 103.0.5030.1


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1308341
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2163

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

8) Improperly implemented security check for standard

EUVDB-ID: #VU64567

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-2164

CWE-ID: CWE-358 - Improperly Implemented Security Check for Standard

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to incorrect implementation in Extensions API in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.

Mitigation

Update to version 103.0.5060.53.

Vulnerable software versions

Google Chromium: 103.0.5006.0 - 103.0.5030.1


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1268445
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2164

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

9) Input validation error

EUVDB-ID: #VU64568

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-2165

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input in URL formatting in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.

Mitigation

Update to version 103.0.5060.53.

Vulnerable software versions

Google Chromium: 103.0.5006.0 - 103.0.5030.1


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1250993
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2165

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###